Description

A flaw was found in Keycloak. When the configuration uses JWT tokens for authentication, the tokens are cached until expiration. If a client uses JWT tokens with an excessively long expiration time, for example, 24 or 48 hours, the cache can grow indefinitely, leading to an OutOfMemoryError. This issue could result in a denial of service condition, preventing legitimate users from accessing the system.

INFO

Published Date :

2025-03-25T08:20:57.666Z

Last Modified :

2026-05-06T16:48:50.818Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2025-2559 vulnerability.

Vendors Products
Redhat
  • Build Keycloak
  • Red Hat Single Sign On

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact